Data Security


Recent Data Security Articles

Outsourcing Security: Are You Ready?

Outsourcing is an attractive option for businesses that would rather not deal with a 3 a.m. DNS attack or a hacker defacing the website during non-business h...  Read more

10 Steps to Database Security

Most small and mid-sized businesses that build and administer databases focus on performance and availability. Security is usually an afterthought. Until you...  Read more

Protecting Data: The Old Fashioned Way

Online backup isn’t for every business. And tape is a backup media of the past. Here are some options in traditional -- or file-based -- backup programs.  Read more

Pay for Storage? Weighing the Free -- and Low Cost -- Options

Google's entrance into online storage, offering users some free storage – with more available for a fee -- increases the choices for small businesses. Here...  Read more

The Right Way to Respond to a Data Breach

Laptops get stolen. Insiders steal data. And hackers are always trying to intrude. In many states, businesses that experience data breaches have to notify al...  Read more

Safeguard Your Biggest Asset -- Your Data

A company’s data is its life blood, so why risk having it lost, stolen, or hacked into with shoddy security and privacy practices? Regular audits can help ...  Read more

Securing Your Business Laptops (And the Data Inside)

Tips on how to secure your business laptops -- and the data that resides on them -- whether they're in the office or on the road.  Read more

Guarding Against the Threat from Within

Most businesses have made sure to protect computer systems and networks from hackers. But the majority of data leaks or breaches of sensitive company informa...  Read more

Ask, and You Shall Be Misled

Customers can tell you a lot. But sometimes they don't know what they're talking about.  Read more

Computer Security: What We're Worrying About

Here's what computer security threats are keeping entrepreneurs up at night, according to a survey by the research firm Forrester.  Read more

Which Anti-Virus Software Should You Use?

A round-up of products that can help protect your company computers from viruses, worms, Trojan horses and other forms of attack.  Read more

Preventing Credit Card Fraud on Your Website

Despite e-payment options, credit cards remain the Internet’s primary currency. Here are some basic steps to keep your e-commerce site safe from credit fraud.  Read more

How Far to Trust Digital Signatures

A law passed in 2000 makes electronic signatures as binding as written signatures.  Read more

Should You Monitor Employee E-Mail?

Examining the legal, ethical, and business-related factors involved in reviewing the messages sent by your staff.  Read more

Tips for Developing a Workplace E-Mail Policy

For a variety of liability and business reasons, your business needs an e-mail policy. Here are some tips on how to make it work.  Read more

Onsite vs. Off: Where Should Your Servers Be?

Considerations such as power costs, servers crashing, and security need to be considered when making the decision where to store your servers.  Read more

Telecom Tricksters: How to Avoid Slamming, Cramming and Hijacking

A guide to protecting your business against unscrupulous phone company tactics.  Read more

How Often Should You Back Up Files?

Rudimentary data protection can be a business life-saver.  Read more

The Basics: What is Encryption?

Encryption in e-mail and other digital files can protect data from prying eyes.  Read more

What are Macroviruses?

These viruses targeted Microsoft Office applications but appeared to be beaten. Do you need to prepare for a comeback?  Read more

The Basics: What is Phishing?

They can tarnish a company's image for those businesses that are unprepared.  Read more

Data Lockdown

Keeping your computer network safe.  Read more

Inc. 500 Firm Denies Wrongdoing in Lawsuit

Gratis Internet faces charges of selling customer e-mail addresses to marketing agencies.  Read more

Thinking Inside the Box

Geraldine Laybourne of the Oxygen channel has finally discovered what women want -- perhaps to her chagrin, definitely to her profit.  Read more

Data Disasters

Create your own homeland security strategy to protect your company's precious data from becoming a victim.  Read more